Cooperative Secure Transmission by Exploiting Social Ties in Random Networks

Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication, and so on. In this paper, we propose a social ties based hybrid cooperative beamforming and jamming scheme to secure wireless transmissions under a stochastic geometry framework, where the friendly nodes are categorized into relays and jammers according to their locations and social trust degrees with the source node. Connection outage probability (COP) and secrecy outage probability (SOP) of such a scheme in a random network have been analyzed. To facilitate a more convenient performance evaluation, we propose a double Gamma ratio approach through the Gamma approximation method. Based on this, the COP and SOP are tractably obtained in closed-forms. We further consider the SOP in the presence of Poisson point process distributed eavesdroppers and derive an upper bound. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the security performance in the networks.

[1]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[2]  Tony Q. S. Quek,et al.  Trust Degree Based Beamforming for MISO Cooperative Communication System , 2015, IEEE Communications Letters.

[3]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[4]  Zaher Dawy,et al.  Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[5]  Hao Chen,et al.  Social Tie Based Cooperative Jamming for Physical Layer Security , 2015, IEEE Communications Letters.

[6]  Dusit Niyato,et al.  Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey , 2011, Proceedings of the IEEE.

[7]  Zaher Dawy,et al.  A Social-Aware Framework for Efficient Information Dissemination in Wireless Ad Hoc Networks , 2017, IEEE Communications Magazine.

[8]  Victor C. M. Leung,et al.  A Survey on Mobile Social Networks: Applications, Platforms, System Architectures, and Future Research Directions , 2015, IEEE Communications Surveys & Tutorials.

[9]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[10]  Qian Yang,et al.  Cooperative Transmission for Physical Layer Security by Exploring Social Awareness , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[11]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[12]  Jeffrey G. Andrews,et al.  A primer on spatial modeling and analysis in wireless networks , 2010, IEEE Communications Magazine.

[13]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Feng Liu,et al.  Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.

[16]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[17]  Sinan Aral,et al.  Identifying Influential and Susceptible Members of Social Networks , 2012, Science.

[18]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[19]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[20]  Stefano Chessa,et al.  Empowering mobile crowdsensing through social and ad hoc networking , 2016, IEEE Communications Magazine.

[21]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[22]  Il-Min Kim,et al.  Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[23]  Xu Chen,et al.  Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.

[24]  Sheng Chen,et al.  Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks , 2015, IEEE Wireless Communications Letters.

[25]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[26]  Li Wang,et al.  Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications With Social Interaction Constraints , 2017, IEEE Transactions on Vehicular Technology.

[27]  Ning Ge,et al.  Joint Social-Position Relationship Based Cooperation Among Mobile Terminals , 2014, IEEE Communications Letters.

[28]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[29]  Kun Yang,et al.  Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges , 2013, IEEE Communications Surveys & Tutorials.

[30]  Tony Q. S. Quek,et al.  Confidential Cooperative Communication With Trust Degree of Potential Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[31]  Sheng Chen,et al.  Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.

[32]  Robert W. Heath,et al.  Modeling heterogeneous network interference , 2012, 2012 Information Theory and Applications Workshop.

[33]  Hui-Ming Wang,et al.  Destination Assisted Jamming and Beamforming for Improving the Security of AF Relay Systems , 2017, IEEE Access.

[34]  Xu Chen,et al.  Social-aware relay selection for cooperative networking: An optimal stopping approach , 2014, 2014 IEEE International Conference on Communications (ICC).

[35]  Xinbing Wang,et al.  Secrecy Capacity Scaling of Large-Scale Networks With Social Relationships , 2017, IEEE Transactions on Vehicular Technology.

[36]  Huiming Wang,et al.  Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.

[37]  Cecilia Mascolo,et al.  Designing mobility models based on social network theory , 2007, MOCO.

[38]  Tao Jiang,et al.  Share communication and computation resources on mobile devices: a social awareness perspective , 2016, IEEE Wireless Communications.